EP1023794A4 - System for detecting unauthorized account access - Google Patents

System for detecting unauthorized account access

Info

Publication number
EP1023794A4
EP1023794A4 EP19960918296 EP96918296A EP1023794A4 EP 1023794 A4 EP1023794 A4 EP 1023794A4 EP 19960918296 EP19960918296 EP 19960918296 EP 96918296 A EP96918296 A EP 96918296A EP 1023794 A4 EP1023794 A4 EP 1023794A4
Authority
EP
Grant status
Application
Patent type
Prior art keywords
system
user
number
sequence
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP19960918296
Other languages
German (de)
French (fr)
Other versions
EP1023794A1 (en )
Inventor
Joseph F Walsh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
E-COMM Inc
COMM Inc E
Original Assignee
E-COMM INCORPORATED
COMM INC E
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • G06K7/10881Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices constructional details of hand-held scanners
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • G06Q20/4037Remote solvency checks

Abstract

A method and system for detecting unauthorized account access are disclosed. The central computer (100) is coupled through a communication path (101) to a local computer system (110). The local computer system (110) is coupled through a communication system (120) and then through a communication path (131) to user appliances (130). The individual telephone connection (131) may be either land line telephone connections or cellular telephone connections.

Description

S P E C I F I C A T I O

Title of the Invention

System for Detecting Unauthorized Account Access

Background of the Invention

1. Field of the Invention

This invention relates to a method and system for detecting unauthorized account access.

2. Description of Related Art

Advances in communications and in computing have caused businesses and other organizations to offer remote access, i.e., access by means of a communication medium such as a telephone network, to a variety of goods and services. ; Because remote access does not involve face-to-face contact, it is generally necessary to authenticate the person seeking access. Such authentication may comprise having the person seeking access providing some authentication information (such as an account number or a credit card or debit card number) . c Because information such as account numbers is often easy for unauthorized persons to obtain, the person seeking access must typically also supply some hidden authorization information, such as a password.

o One problem which has arisen in the art of remote access is that it is sometimes possible for unauthorized persons to obtain the hidden authorization information. First, unauthorized persons may simply guess the hidden authorization information; this can occur when the hidden authorization information is relatively short, such as a password or a bank-access card "PIN" (personal identification number) . Second, unauthorized persons may monitor electronic communications by the authorized person for the hidden authorization information; this can occur for cellular telephones and similar devices. When unauthorized persons construct a duplicate cellular telephones with a copy of the hidden authorization information, this is called "cloning" and the duplicate cellular telephone is called a "clone". Third, unauthorized persons may simply bribe employees of the service provider, or other persons having access to the hidden authorization information.

Known methods of access control have been reasonably successful at preventing access by unauthorized persons, but are generally unable to prevent access by unauthorized persons who have obtained the hidden authorization information. Because it is possible for unauthorized persons to obtain the hidden authorization information, known methods of access control have the drawback that the authorized person may not be aware that unauthorized persons have obtained access.

Some examples of known methods of access control in telephone communication systems are as follows:

U.S. Patent 4,860,341, "Radiotelephone Credit Card Call Approval Synchronization", issued August 22, 1989, shows a system in which a credit card is used to place cellular telephone calls, using a cellular telephone .with a credit card reader. In this system, authentication requires a separate call to a verification and billing computer system to authenticate the credit card before the user is allowed to access the cellular telephone network. U.S. Patent 5,249,230, "Authentication System", issued September 28, 1993, in the name of Thomas J. Mihm, Jr., and assigned to Motorola, Inc., shows a system which receives an equipment ID for each user terminal and uses a secret key to encrypt the equipment ID with a user ID and an error detection code, to form an encrypted block. The encrypted block is programmed into a physical authentication module which is physically distributed and installed at the user terminal, about once per month.

U.S. Patent 5,343,519, "Autodialer with PIN Feature", issued August 30, 1994, in the name of Peter Feldman, shows an autodialing device which records credit card numbers, personal identification numbers, and telephone numbers in a memory, and which may be used to transmit those numbers on telephone connections and to automated teller machines. The device sends these numbers much faster than a person could key them in, and does not require that the person must key them in while being watched, which provides a measure of security against unauthorized persons who might be listening or watching.

U.S. Patent 5,361,062, "Personal Security System", issued November 1, 1994, in the name of Kenneth P. Weiss et al. and assigned to Security Dynamics Technologies, Inc., shows a method and system for verifying the identity of a user, in which each user is given a token which displays a pseudorandom sequence of values, in response to a seed and an internal clock. The system may frequently demand the current pseudorandom value from the user, who simply types it in, thus verifying posssession of the token.

While each of these known methods of access control achieves the purpose of preventing access by unauthorized persons, they are generally subject to two drawbacks: (1) Unauthorized persons who have obtained the hidden authorization information (or duplicated any physical circuits needed for access) may still obtain access. (2) In the circumstance that access is compromised, the authorized person is not necessarily made aware of that compromise.

In circumstances where remote access is for goods or services which require payment, either the authorized person (the customer) or the service provider ends up paying for the goods or services consumed by unauthorized persons who obtained unauthorized access. This may be discovered when the service provider bills the customer for the unauthorized goods or services. Accordingly, it would be desirable to determine as soon as possible after any unauthorized access occurs, in particular, before any further unauthorized distribution of access information.

Another problem which has arisen in the art is that since the authorized person generally is not informed of the unauthorized access (until receiving a cellular telephone bill) , the information to create the cloned device is valuable to unauthorized persons, but only for a relatively short time. Accordingly, this cloning information may be further distributed by the creator of the clone, and redistributed by others receiving the cloning information. The cloning information may thus be quite widely distributed, sometimes resulting in hundreds or thousands of clones.

Accordingly, it would be desireable to provide a method and system for automatically preventing unauthorized account access by numerous unauthorized devices.

Known methods of communication exist for determining if messages, or portions of messages, have been lost or damaged. For example, the Kerberos V5 system, as described in Kaufman, Network Security: PRIVATE Communication in a PUBLIC World, optionally inserts a sequence number in message packets so that messages which are lost or out-of-order may be detected. While this method achieves the purpose of detecting lost or out-of-order messages, it is still subject to the drawbacks noted for known methods of authentication. In i particular, although credentials messages are identified with sequence numbers, there is no mechanism for detecting and reporting successful access by unauthorized persons.

Accordingly, it would be desirable to provide a i method and system for automatically detecting unauthorized account access and automatically preventing unauthorized account access by duplicate account access devices.

Summary of the Invention is The invention provides a method and system for detecting unauthorized account access. In a preferred embodiment, the system may operate in conjunction with known methods of remote access authentication. The system provides a unique account for each authorized person (i.e., each user)

20 and a system sequence number and a user sequence number for each account. For each access to the account, the system updates the system sequence number corresponding to that account to the next number in a preselected sequence, and the user updates the user sequence number in like manner.

C Preferably, the preselected sequence comprises a sequence of pseudorandom numbers and the update comprises selecting the next pseudorandom number using a pseudorandom number generator, but in alternative embodiments the sequence number may be updated using other techniques, so long as the system so and the user are both capable of performing the same updates.

In a preferred embodiment, the system and the user perform a handshake process, to assure that the system updates the system sequence number, and the user updates the user 3 sequence number, in synchrony. Normally, the system sequence number and the user sequence number will be the same, but when there is an unauthorized access by third party the system will update the system sequence number and the user will not update the user sequence number, causing the two sequence numbers to be unequal. When the two sequence numbers are unequal, when the user next accesses the account, the user is made aware that an unauthorized access has occurred.

Brief Description of the Drawings

Figure 1 shows a system for remote access to a service provider by a user.

Figure 2 shows a system for credit card or debit card verification and authorization.

Figure 3, comprising figure 3A and figure 3B collectively, shows a process flow diagram of a method for detecting unauthorized access by cloned devices.

Figure 4, comprising figure 4A, figure 4B, and figure 4C collectively, shows a data flow diagram of a method for electronic signature.

Description of the Preferred Embodiment

In the following description, a preferred embodiment of the invention is described with regard to preferred process steps and data structures. However, those skilled in the art would recognize, after perusal of this application, that embodiments of the invention may be implemented using one or more general purpose computers operating under program control, and that modification of such general purpose computers to implement the process steps and data structures described herein would not require undue invention. The present invention may be used in conjunction with inventions disclosed in the following co-pending applications.

o 5 Application Serial No. , D'Alessandro & Ritchie

Docket No. XIC-001, filed the same day as the present application, in the name of the same inventor as the present application, titled "Bar Code Wand and Sound Communication System"; and

10 o Application Serial No. , D'Alessandro & Ritchie

Docket No. XIC-002, filed the same day as the present application, in the name of the same inventor as the present application, titled "Low Power Bar Code Wand".

15

These applications are each hereby incorporated by reference as if fully set forth herein, and are referred to collectively herein as the "incorporated disclosures".

2o REMOTEACCESSTOASERVICEPROVIDER

Figure 1 shows a system for remote access to a service provider by a user.

In a preferred embodiment, a system for remote 25 access to a service provider by a user may be used in conjunction with inventions shown in the incorporated disclosures. The system comprises a central computer system 100 for storing authorization and verification information about users. The central computer system 100 is coupled using so a communication path 101 to a local computer system 110, for performing authorization and verification of users.

Preferably, there is more than one local computer system 110 and each is coupled to the central computer system 35 100 by a corresponding communication path 101. However, in alternative embodiments, there may be only a single local computer system 110 or a plurality of local computer systems 110 may multiplex or otherwise share a single communication path 101. Moreover, there is no special requirement that the central computer system 100 must be physically remote from the local computer systems 110, or that it must be physically located in some "central" place. Similarly, there is no special requirement that the local computer systems 110 must be physically "local" to anything in particular.

In a preferred embodiment, the communication path

101 comprises a telephone connection using a telephone network. However, those skilled in the art would recognize, after perusal of this application, that the communication path 101 may comprise any means for communication, including a cellular telephone connection, a radio telephone connection, a local or wide-area computer network connection, or some other communication medium.

The local computer system 110, for providing services to users, is coupled using a communication system 120 to a user device 130, for communicating user commands to the local computer system 110 and information from the local computer system 110 to the user. Preferably, there is more than one user device 130 (and there is preferably more than one user) and each is coupled to the communication system 120. However, in alternative embodiments, there may be only a single user device 130, or the local computer system 110 may use a plurality of communication systems 120 for coupling to user devices 130.

In a preferred embodiment, the communication system 120 is a telephone network, to which the user devices 130 make individual telephone connections 131. The individual telephone connections 131 may comprise land-line telephone connections, cellular telephone connections, or other telephone connections. However, those skilled in the art will recognize, after perusal of this application, that the communication system 120 may comprise any means for communication, including a cellular telephone network, a radio telephone network, a local or wide-area computer network, a communication satellite, or some other communication medium.

As described in further detail with regard to figure 3, each user uses a user device 130 to communicate with the local computer system 110 for providing services, and each user device 130 uses a communication system 120 to communicate with the local computer system 110. The local computer system 110 communicates using the communication path 101 with the central computer system 100 for authenticating users.

CREDITCARDOR DEBITCARDVERIFICATIONANDAUTHORIZATION

Figure 2 shows a system for credit card or debit card verification and authorization.

A system 200 for credit card or debit card verification and authorization comprises a central computer system 100 for authorization and verification of accounts, a local computer system 110 for providing services, a communication path 101 coupling the central computer system 100 and the local computer system 110, and a communication system 120, like that described with regard to figure 1.

The system 200 further comprises a card reader 210 into which a card 220 can be placed. Preferably, the card 220 is a credit card or a debit card, but in alternative embodiments the card 220 may be an authorization card, an identification card, or another card for the purpose of authentication of the authorized person, such as a customer.

The card reader 210 is coupled to the communication system 220 using a telephone connection 131 like that described with regard to figure 1. Thereafter, as described in further detail with regard to figure 3, the card reader 210 uses the communication system 120 to communicate with the local computer system 110 for providing services. The local computer system 110 communicates using the' communication path 101 with the central computer system 100 for authenticating users.

As the technique shown with regard to figure 3 involves recording a sequence number by the user (or the user device 130), the card reader 210 is preferably also capable of writing data to the card 220, and the card is preferably also capable of receiving and storing such data.

In a simple alternative embodiment, the credit card reader 210 may present the sequence number to the user (or the user device 130) for verification, using either audio or visual means. In this alternative embodiment, the sequence number is preferably a simple counting function, so that the user can easily determine if any third party has used the account.

In a preferred embodiment where the card reader 210 is located a point-of-sale terminal or a sales location, the card read may skip the step of coupling to any local computer system 110 and use the communication path 101 to couple directly to the central computer system 100 for authorization and verification of the card 220.

METHODFORDETECTING UNAUTHORIZEDACCESSBYCLONEDDEVICES Figure 3, comprising figure 3A and figure 3B collectively, shows a process flow diagram of a method for detecting unauthorized access by cloned devices.

A method 300 for detecting unauthorized access by cloned devices comprises a handshake protocol with a set of user steps 311 through 320 to be performed by the user and a set of system steps 321 through 330 to be performed by the system (the central computer system 100 and the local computer system 110) . The user steps 311 through 320 are generally performed by the user device 130 shown in figure 1 or the card -- reader 210 shown in figure 2, while the system steps 321 through 330 are generally performed by the central computer system 100 and the local computer system 110 shown in figure 1 and figure 2.

o At a step 311, the user activates the user device

130. In a preferred embodiment, the user device 130 initiates the method 300 each time it is powered up or it accesses the local computer system 110, and may further initiate the method 300 after selected intervals of time, e.g., once every eight s hours while it remains powered up. However, those skilled in the art will recognize, after perusal of this application, that there are no specific times when the method 300 must be initiated, and that selection of various times for initiation of the method are within the scope and spirit of the 0 invention.

At a step 312, the user device 130 contacts the central computer system 100 using the local communication system 120. This step 312 is performed by coupling a

25 telephone handset to the telephone connection 131 and dialing a telephone number associated with the local computer system 110. Preferably, the user device 130 automatically makes the connection and automatically dials the telephone number. However, those skilled in the art will recognize, after se perusal of this application, that this step 312 may comprise any method of contacting the central computer system 100, including a cellular telephone connection, a radio telephone connection, or a local or wide-area computer network connection. At a step 313, the user device 130 bundles together a unique identifier for itself (a "device ID"), a unique identifier for a user account for which it seeks authentication (an "account ID") , and a sequence number, into a sign-on message, encrypts that sign-on message with an encryption technique, and transmits the encrypted sign-on message to the central computer system 100. The encrypted sign-on message is further described with regard to figure 4.

In a preferred embodiment, the device ID comprises a unique identifier assigned to the device when it is manufactured.

In a preferred embodiment, the account ID comprises a unique identifier assigned to the user account when it is created. Each user account is associated with a user who is authorized to obtain services from the local computer system 110 using that account. Some user accounts may be associated with more than one user, such as a credit card which is associated with more than one member of a family. Each user account is generally associated with a billing statement, although in alternative embodiments some user accounts may be bundled together in a joint billing statement, such as a corporate credit card account.

In a preferred embodiment, the sequence number comprises a numeric value which is maintained synchronized between the central computer system 100 and the user device 130. The sequence number is stored in nonvolatile storage at the user device 130, so that the most recently used sequence number is available to the user device 130 when the method 300 is performed. Similarly, the sequence number is stored in nonvolatile storage or on a mass storage device at the central computer system 100, so that the most recently used sequence number is available to the central computer system 100 when the method 300 is performed. In a preferred embodiment, the nonvolatile storage in which the sequence number is stored comprises a protected memory having the property that it self-erases if an attempt is made to read the protected memory in other than the ordinary course.

At a step 321, the local computer system 110 receives the sign-on message sent by the user device in the ι step 313, and requests the central computer system 100 to retrieve an account profile associated with the account ID which was transmitted. The account profile comprises information about the selected user account, and includes the sequence number associated with that user account.

In a preferred embodiment, more than one user device 130 may be associated with a single user account, but in that circumstance, each such user device 130 has its own profile. The sign-on message comprises a device ID for the user device 20 130 sending the message, so the central computer system 100 is able to determine which profile to retrieve if there are several profiles for a user account.

In a preferred embodiment, each profile comprises 2 information shown in table 3-1:

Table 3-1. o a device ID, the unique identifier for the user device; o a set of account IDs, each a unique identifier 'for a user

3c account authorized for access using this user device; o a set of user IDs, each a unique identifier for a user authorized to use this user device; o the current sequence number, and an identifier for a method for updating the sequence number; o a set of profile encryption parameters, such as an encryption protocol (preferably the "DES" or "IVES" protocols) and a set of encryption keys; and o a set of selected profile options, such as a typical calling 5 telephone number associated with this user account.

At a step 322, the local computer system 110 compares the sequence number transmitted with the sign-on message with the sequence number in the account profile. The ιc step 322 is shown in further detail in figure 3B.

Those skilled in the art would recognize, after perusal of this application, that comparison of sequence numbers could be performed by the central computer system 100, is by the local computer system 110, or by another computer system, so long as results of the comparison are used for authenticating the user device 130 and are reported to the user device 130 so that the user can determine if any unauthorized access has occurred.

20

In a first part of the step 322, the local computer system 110 compares the sequence number transmitted with the sign-on message with the sequence number in the account profile. If the two values are equal, the local computer 25 system 110 follows the "EQUAL" path arrow to a first part of the step 326.

If the two values are unequal, the local computer system 110 proceeds with the second part of the step 322. In so a second part of the step 322, the local computer system 110 determines if a sequence flag is set. The sequence flag indicates that one or more access attempts has been made with this particular user device 130, in which the handshake process for updating the sequence number failed. If the

35 sequence flag is set, the central computer system 100 follows the "TRY AGAIN" path arrow to the second part of the step 326. In a preferred embodiment, the local computer system 100 checks the sequence flag only if the sequence number transmitted by the user device 130 is consistent with the s presumption that the proper user is attempting access after a failed handshake. For example, if sequence numbers are updated in natural number order, i.e., one, two, three, . . ., the local computer system 110 requires the sequence number to be something close, e.g., four or five, before checking the o sequence flag. Other sequence numbers are presumed to indicate an attempt at unauthorized access.

Similarly, in a preferred embodiment, the local computer system 110 checks the sequence flag only a limited s number of times, e.g., a maximum of three access attempts.

In a preferred embodiment, the user (or the user device 130) maintains an alternative telephone number to call for access, and/or a secondary authentication path (e.g., 0 requiring a secondary password or authentication with a human operator) , so as to provide the user an method for access in the event that the need for access is urgent.

If the two values are unequal and the sequence flag 25 is not set, the local computer system 110 proceeds to the step 323.

At a step 323, the local computer system 110 obtains a set of "caller ID" information and records that information.

3o Preferably, the caller ID information comprises information about the calling telephone number, where that information is available from the telephone network service provider. In a preferred embodiment, the local computer system 110 also records other information about the call, such as the time it

35 occurred and the recipient telephone number. At a step 324, the local computer system 110 informs relevant authorities (including the central computer system 100) that the user account has been subject to unauthorized access. In general, the unauthorized access is this s particular call, as unauthorized persons are unlikely to have the correct sequence number for transmission to the local computer system 110 in the sign-on message. However, if an unauthorized person obtains the correct sequence number, the sequence number will be desynchronized between the system and o the proper user device 130, and the next access attempt by the authorized user will produce a sequence number mismatch.

In a preferred embodiment, the step 324 is performed by send a telecopy message to a set of preselected destination s telecopiers. For example, the preselected destination telecopiers could comprise a telecopier associated with a known authorized user.

At a step 325, the local computer system 110 denies o access to the user device 130 and terminates the call.

At a step 314, the user device 130 begins the handshake procedure with the local computer system 110.

5 At a step 326, the local computer system 110 responds to the sign-on message from the user device 130. The step 326 is shown in further detail in figure 3B.

In a first part of the step 326, the user's sequence so number and the system' s sequence number are equal. The local computer system 110 sends an "EQUAL" message to the user device 130, and proceeds to the step 327. In response to the "EQUAL" message, the user device proceeds to the step 315.

35 In a second part of the step 326, the user's sequence number and the system's sequence number are unequal, but the sequence flag is set. The local computer system 110 sends a "TRY_AGAIN" message to the user device- 130, and proceeds to the step 321. In response to the "TRY_AGAIN" message, the user device proceeds to the step 320, where it updates the user's sequence number, and thereafter proceeds to the step 313.

At a step 315, the user device 130 updates its recorded sequence number.

In a preferred embodiment, the sequence number is selected from a pseudorandom sequence and the method for updating the sequence number is to select the next pseudorandom number in the pseudorandom sequence using a pseudorandom number generator. Pseudorandom number generators are described in D. Knuth, The Art of Computer Programming (vol. 2: Seminumerical Algorithms) (Addison-Wesley 1968) .

However, those skilled in the art would recognize, after perusal of this application, that the method for updating the sequence number may comprise any one of a wide variety of techniques, such as (1) adding a constant to the sequence number, (2) multiplying the sequence number by a constant, or (3) some combination thereof.

In alternative embodiments, a plurality of sequence numbers may be associated with different message or tasks. For example, a first sequence number may be used for the sign- on message and a second sequence number may be used for other messages. In another example, a first sequence number may be used for messages with relatively higher security and a second sequence number may be used for messages with relatively lower security.

At a step 327, the system (both the central computer system 100 and the local computer system 110) updates its recorded sequence number for the indicated user account, and resets the sequence flag.

At a step 316, the user device 130 determines if the 5 handshake procedure completed properly. If not, the user device 130 proceeds with the step 317. If so, the user device 130 proceeds with the step 319.

At a step 317, the user device 130 restores the ιc sequence number to the value it had before initiating the method 300.

At a step 318, the user device 130 terminates the call.

15

At a step 328, the local computer system 110 determines if the handshake procedure completed properly. If not, the local computer system 110 proceeds to the step 329. If so, the local computer system 110 proceeds to the step 331.

20

At a step 329, the system (both the central computer system 100 and the local computer system 110) increments the sequence flag.

25 At a step 330, the local computer system 110 terminates the call.

At a step 319, the user device 130 obtains services from the local computer system 110. In a preferred se embodiment, the user device 130 processes a customer order placed by the user. After processing the order or obtaining other services, the user device 130 proceeds to the step 318 and terminates the call.

35 At a step 331, the local computer system 110 authenticates the user to an order processing subsystem, which processes the order or performs other services for the user. After processing the order or performing other services, the local computer system 110 terminates the call.

In a preferred embodiment, the user account comprises a first account in a plurality of user accounts for the same user, about which information is maintained at the central computer system 100. If any one of the user's user accounts is compromised by an unauthorized access, that unauthorized access will be detected by the local computer system 110 in response to a mismatch between the system's sequence number and the user's sequence number. The local computer system 110 so informs the central computer system 100. When the user accesses any other one of the user's user accounts using a (possibly different) local computer system 110, the central computer system 100 informs the local computer system 110 of the unauthorized access to the user's other user account, and the local computer system 110 so informs the user.

METHODFORELECTRONICSIGNATURE

Figure 4, comprising figure 4A, figure 4B, and figure 4C collectively, shows a data flow diagram of a method for electronic signature.

The user device 130 indicates to the central computer system 100 that an activity is authorized by the user by sending an encrypted message comprising identifying information for the user. The user device 130 bundles together a set of information into a message and encrypts that information for transmission to the central computer system 100.

The sign-on message 400 described with regard to figure 3 comprises an account ID number 401, a device ID number 402, a sequence number 403, and a media integrity code 404. The media integrity code 404 comprises a checksum or CRC code, to indicate whether any part of the message has been altered, damaged or garbled in transmission. The central computer system 100 or the local computer system 110 receives the sign-on message 400, decrypts it, checks the media integrity code 404, and identifies the separate individual items of information.

In a preferred embodiment, when the user desires to place an order for goods or services, the user device 130 sends an order-approval message 410 to the central computer system 100. The order-approval message 410 comprises an order number 411, the device ID number 402, the current sequence number 403, a user ID number 412, and the media integrity code 404. The central computer system 100 receives the order- approval message 410, decrypts it, checks the media integrity code 404, and identifies the separate individual items of information, in like manner as for the sign-on message 400. However, in a preferred embodiment the sequence number 403 is not updated for the order-approval message 410, only for the sign-on message 400. The central computer system 100 then transmits selected information to the local computer system 110.

In a preferred embodiment, when the user device 130 is about to send, to the central computer system 100 or the local computer system 110, data which is user sensitive, the user device 130 sends a sensitive-data message 420 to the central computer system 100 or to the local com'puter system c 110. The sensitive-data message 420 comprises the device ID number 402, the current sequence number 403, the user ID number 412, and the media integrity code 404. The central computer system 100 receives the sensitive-data message 410, decrypts it, checks the media integrity code 404, and 5 identifies the separate individual items of information, in like manner as for the sign-on message 400. However, in a preferred embodiment the sequence number 403 is not updated for the order-approval message 410, only for the sign-on message 400. The central computer system 100 then transmits selected information to the local computer system 110.

Alternative Embodiments

Although preferred embodiments are disclosed herein, many variations are possible which remain within the concept, scope, and spirit of the invention, and these variations would become clear to those skilled in the art after perusal of this application.

Claims

Claims / claim:
1. A method for detecting unauthorized access to an account, said method comprising associating a sequence number with said account at an authentication device; authenticating access to said account in response to a request for access by an accessing device; updating said sequence number for said account both for said authentication device and for said accessing device; and comparing said sequence number at said authentication device with said sequence number at said accessing device.
2. A method as in claim 1, comprising the step of denying access when said step of comparing is not equality.
3. A method as in claim 1, comprising the step of sending a message to a selected destination in response to said step of comparing.
4. A method as in claim 1, comprising the steps of associating an alternative sequence number with said account at said authentication device; authenticating access to said account in response to a request for access by an accessing device using said alternative sequence number; resetting said sequence number for said account both for said authentication device and for said accessing device in response to said authenticated access using said alternative sequence number.
5. A method as in claim 4, wherein said step of authenticating access to said account in response to a request for access by an accessing device using said alternative sequence number comprises an alternative technique for identifying said accessing device.
6. A method as in claim 5, wherein said alternative technique comprises comparing a human voice.
7. A method as in claim 5, wherein said alternative technique comprises comparing a PIN number.
8. A method as in claim 4, wherein said step of authenticating access to said account in response to a request for access by an accessing device using said alternative sequence number comprises intervention by a human operator.
9. A method as in claim 1, comprising the steps of attempting to authenticate access to a first one of said plurality of accounts in response to a request for access by a first accessing device; when said attempt is unsuccessful, recording said attempt in a record for said plurality of accounts; authenticating access to a second one of said plurality of accounts in response to a request for access by a second accessing device; and transmitting information about said attempt to said second accessing device.
10. A method as in claim 1, wherein said sequence number is stored in a protected memory at said accessing device.
11. A method as in claim 1, wherein said step of associating a sequence number with said account comprises the step of associating said sequence number with a plurality of the following: an accessing device number, an account identifier, a user identifier. 12. A method as in claim 1, wherein said step of associating a sequence number with said account comprises the step of storing said sequence number in an profile for said account.
13. A method as in claim 1, wherein said step of authenticating access comprises the steps of identifying a sequence number in said request for access; and comparing said sequence number at said authentication device with said sequence number in said request for access.
14. A method as in claim 1, wherein said step of comparing comprises the steps of encrypting said sequence number at said accessing device into an encrypted message; transmitting said encrypted message to said o authentication device; and decrypting said encrypted message at said authentication device.
15. A method as in claim 1, wherein said step of 5 updating said sequence number comprises the steps of computing a pseudorandom number responsive to said sequence number; and replacing said sequence number with said pseudorandom number. 0
16. A method as in claim 1, wherein said step of updating said sequence number comprises the steps of storing said sequence number in memory before updating; 5 initiating a handshake process between said authentication device and said accessing device; updating said sequence number at said authentication device; independently updating said sequence number at said accessing device; attempting to perform a step of completing said handshake process between said authentication device and said accessing device; and retrieving said sequence number from said memory if said attempt to perform said step of completing fails.
17. A method as in claim 1, wherein said step of updating said sequence number comprises the steps of updating said sequence number at said authentication device using an update method and storing said updated sequence number at said authentication device; and updating said sequence number at said accessing device using an update method and storing said updated sequence number at said accessing device; wherein said update method is performed independently at said authentication device and at said accessing device.
18. A method for detecting unauthorized access to an account, said method comprising associating a sequence number with said account at an authentication device; authenticating access to said account in response to a request for access by an accessing device and a sequence number entered by a user of said accessing device; updating said sequence number for said account for said authentication device; presenting said updated sequence number to said user; and comparing said sequence number at said authentication device with said sequence number at said accessing device. 19. A method for detecting unauthorized access to one of a plurality of accounts, said method comprising authenticating access to a first' one of said plurality of accounts in response to a request for access by an accessing device; recording information about said access to said first one account in a record for said plurality of accounts; and presenting information from said record regarding a prior access to a second one of said plurality of accounts to a user of said accessing device.
EP19960918296 1995-06-07 1996-06-07 System for detecting unauthorized account access Withdrawn EP1023794A4 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US48508395 true 1995-06-07 1995-06-07
US48226195 true 1995-06-07 1995-06-07
US480614 1995-06-07
US485083 1995-06-07
US08480614 US5696824A (en) 1995-06-07 1995-06-07 System for detecting unauthorized account access
US482261 1995-06-07
PCT/US1996/009406 WO1996041446A1 (en) 1995-06-07 1996-06-07 System for detecting unauthorized account access

Publications (2)

Publication Number Publication Date
EP1023794A1 true EP1023794A1 (en) 2000-08-02
EP1023794A4 true true EP1023794A4 (en) 2002-01-09

Family

ID=27413534

Family Applications (3)

Application Number Title Priority Date Filing Date
EP19960923238 Withdrawn EP0836773A1 (en) 1995-06-07 1996-06-07 Handheld remote computer control and methods for secured interactive real-time telecommunications
EP19960918296 Withdrawn EP1023794A4 (en) 1995-06-07 1996-06-07 System for detecting unauthorized account access
EP19960918297 Withdrawn EP0958672A4 (en) 1995-06-07 1996-06-07 Low power telecommunication controller for a host computer server

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP19960923238 Withdrawn EP0836773A1 (en) 1995-06-07 1996-06-07 Handheld remote computer control and methods for secured interactive real-time telecommunications

Family Applications After (1)

Application Number Title Priority Date Filing Date
EP19960918297 Withdrawn EP0958672A4 (en) 1995-06-07 1996-06-07 Low power telecommunication controller for a host computer server

Country Status (4)

Country Link
US (1) US6144848A (en)
EP (3) EP0836773A1 (en)
JP (3) JPH11507775A (en)
WO (3) WO1996041447A1 (en)

Families Citing this family (376)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7133834B1 (en) * 1992-08-06 2006-11-07 Ferrara Ethereal Llc Product value information interchange server
US5999908A (en) 1992-08-06 1999-12-07 Abelow; Daniel H. Customer-based product design module
US7805500B2 (en) 1995-05-08 2010-09-28 Digimarc Corporation Network linking methods and apparatus
US7751596B2 (en) * 1996-11-12 2010-07-06 Digimarc Corporation Methods and arrangements employing digital content items
US7387253B1 (en) * 1996-09-03 2008-06-17 Hand Held Products, Inc. Optical reader system comprising local host processor and optical reader
US5694546A (en) 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
US5834747A (en) * 1994-11-04 1998-11-10 Pixel Instruments Universal credit card apparatus and method
US6650761B1 (en) * 1999-05-19 2003-11-18 Digimarc Corporation Watermarked business cards and methods
US6714969B1 (en) 1995-11-17 2004-03-30 Symbol Technologies, Inc. Mobile terminal with integrated host application software
US6920637B2 (en) * 1995-11-17 2005-07-19 Symbol Technologies, Inc. Method and apparatus for implementing alerts on a browser running on a portable handheld device
US20030212996A1 (en) * 1996-02-08 2003-11-13 Wolzien Thomas R. System for interconnection of audio program data transmitted by radio to remote vehicle or individual with GPS location
US7382334B1 (en) * 1996-04-26 2008-06-03 T-Rex Property Ab Digital information system
DE19781727T1 (en) * 1996-04-26 1999-03-25 Dahlgren Hylin & Jonason Media Digital Information System
US6945457B1 (en) 1996-05-10 2005-09-20 Transaction Holdings Ltd. L.L.C. Automated transaction machine
US6507864B1 (en) * 1996-08-02 2003-01-14 Symbol Technologies, Inc. Client-server software for controlling data collection device from host computer
US7096003B2 (en) * 1996-08-08 2006-08-22 Raymond Anthony Joao Transaction security apparatus
US5825002A (en) * 1996-09-05 1998-10-20 Symbol Technologies, Inc. Device and method for secure data updates in a self-checkout system
FR2753857B1 (en) 1996-09-25 1998-12-11 Method and system for disseminated secures the services of a computer network of the Internet type
US6434159B1 (en) * 1996-10-15 2002-08-13 Motorola, Inc. Transaction system and method therefor
JPH10174073A (en) * 1996-12-11 1998-06-26 Sony Corp Transmitter and transmission method
US7346564B1 (en) * 1997-02-07 2008-03-18 Frederic J Kirklin System for merchandise ordering and order fulfillment
DE69838967T2 (en) * 1997-02-07 2008-05-08 Casio Computer Co., Ltd. Network system for information supply of mobile terminal
US6750881B1 (en) 1997-02-24 2004-06-15 America Online, Inc. User definable on-line co-user lists
JP4301530B2 (en) * 1997-03-12 2009-07-22 ソニー株式会社 Information processing apparatus and method
US7131591B1 (en) * 1997-03-28 2006-11-07 Symbol Technologies, Inc. Link cost minimization for portable wireless terminal connectable to the internet
US6747692B2 (en) * 1997-03-28 2004-06-08 Symbol Technologies, Inc. Portable multipurpose recording terminal and portable network server
US7085775B2 (en) * 1997-04-09 2006-08-01 Sidewinder Holdings Ltd. Database method and system for conducting integrated dispatching
JP2001513603A (en) * 1997-08-08 2001-09-04 ミラビリス リミテッド Phone status notification system
US6553404B2 (en) * 1997-08-08 2003-04-22 Prn Corporation Digital system
WO1999008194A9 (en) * 1997-08-08 1999-04-29 Pics Previews Inc Digital department system
US6363482B1 (en) 1997-09-08 2002-03-26 Harmonic Data Systems, Ltd. Secure broadband communication
KR100382181B1 (en) * 1997-12-22 2003-05-09 모토로라 인코포레이티드 Single account portable wireless financial messaging unit
US6697103B1 (en) 1998-03-19 2004-02-24 Dennis Sunga Fernandez Integrated network for monitoring remote objects
US6594765B2 (en) * 1998-09-29 2003-07-15 Softvault Systems, Inc. Method and system for embedded, automated, component-level control of computer systems and other complex systems
US6249578B1 (en) * 1998-04-06 2001-06-19 Ameritech Corporation Interactive electronic ordering for telecommunications products and services
US6137873A (en) 1998-04-06 2000-10-24 Ameritech Corporation Automatic electronic telecommunications order translation and processing
US6104999A (en) * 1998-04-06 2000-08-15 Ameritech Corporation Transaction sets for automated electronic ordering of telecommunications products and services
US6607136B1 (en) * 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
GB9819354D0 (en) * 1998-09-04 1998-10-28 Seiko Epson Corp Pos terminal,method of controlling the pos terminal,pos system using the pos terminal and information storage medium
US7386600B1 (en) * 1998-09-11 2008-06-10 Lv Partners, L.P. Launching a web site using a personal device
US8028036B1 (en) * 1998-09-11 2011-09-27 Rpx-Lv Acquisition Llc Launching a web site using a passive transponder
US7379901B1 (en) 1998-09-11 2008-05-27 Lv Partners, L.P. Accessing a vendor web site using personal account information retrieved from a credit card company web site
US7392945B1 (en) 1998-09-11 2008-07-01 Lv Partners, L.P. Portable scanner for enabling automatic commerce transactions
US6704864B1 (en) 1999-08-19 2004-03-09 L.V. Partners, L.P. Automatic configuration of equipment software
US7191247B1 (en) 1998-09-11 2007-03-13 Lv Partners, Lp Method for connecting a wireless device to a remote location on a network
US6823388B1 (en) * 1998-09-11 2004-11-23 L.V. Parners, L.P. Method and apparatus for accessing a remote location with an optical reader having a programmable memory system
US7440993B1 (en) 1998-09-11 2008-10-21 Lv Partners, L.P. Method and apparatus for launching a web browser in response to scanning of product information
US6868433B1 (en) 1998-09-11 2005-03-15 L.V. Partners, L.P. Input device having positional and scanning capabilities
US6745234B1 (en) 1998-09-11 2004-06-01 Digital:Convergence Corporation Method and apparatus for accessing a remote location by scanning an optical code
US6636896B1 (en) 1998-09-11 2003-10-21 Lv Partners, L.P. Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet
US6195093B1 (en) * 1998-09-14 2001-02-27 Fuji Xerox Co., Ltd. Systems and method for controlling a presentation using physical objects
JP2968793B1 (en) * 1998-09-25 1999-11-02 埼玉日本電気株式会社 Data transfer method and system between information devices
JP2000194726A (en) * 1998-10-19 2000-07-14 Sony Corp Device, method and system for processing information and providing medium
EP1003121A3 (en) * 1998-10-30 2001-10-04 Becton, Dickinson and Company Medication and specimen management system
US7168036B2 (en) * 1998-11-13 2007-01-23 Xerox Corporation User interface identification and service tags for a document processing system
US7660763B1 (en) 1998-11-17 2010-02-09 Jpmorgan Chase Bank, N.A. Customer activated multi-value (CAM) card
US6577861B2 (en) * 1998-12-14 2003-06-10 Fujitsu Limited Electronic shopping system utilizing a program downloadable wireless telephone
US6512919B2 (en) 1998-12-14 2003-01-28 Fujitsu Limited Electronic shopping system utilizing a program downloadable wireless videophone
US7296282B1 (en) * 1999-01-22 2007-11-13 Koplar Interactive Systems International Llc Interactive optical cards and other hand-held devices with increased connectivity
US6448979B1 (en) * 1999-01-25 2002-09-10 Airclic, Inc. Printed medium activated interactive communication of multimedia information, including advertising
US6993580B2 (en) 1999-01-25 2006-01-31 Airclic Inc. Method and system for sharing end user information on network
US20020032749A1 (en) * 1999-01-25 2002-03-14 David Isherwood Method and system for identifying provider network locations based on user-provided codes
US6691914B2 (en) 1999-01-25 2004-02-17 Airclic, Inc. Method and system for directing end user to network location of provider based on user-provided codes
US20020030096A1 (en) * 1999-01-25 2002-03-14 David Isherwood Method and system for directing end user to selected network location of provider based on user-provided codes
US6633223B1 (en) * 1999-02-10 2003-10-14 Symbol Technologies, Inc. Wireless LAN scholastic tracking system
US6481627B1 (en) 1999-02-23 2002-11-19 Electronic Warfare Associates, Inc. Fleet refueling method and system
US8321411B2 (en) 1999-03-23 2012-11-27 Microstrategy, Incorporated System and method for management of an automatic OLAP report broadcast system
US6314457B1 (en) * 1999-04-21 2001-11-06 Airclic, Inc. Method for managing printed medium activated revenue sharing domain name system schemas
US7586397B2 (en) * 1999-05-06 2009-09-08 Vulcan Patents Llc Interactive radio frequency tags
US7177825B1 (en) 1999-05-11 2007-02-13 Borders Louis H Integrated system for ordering, fulfillment, and delivery of consumer products using a data network
WO2000068856A3 (en) 1999-05-11 2003-11-27 Webvan Group Inc Electronic commerce enabled delivery system and method
US6975937B1 (en) 1999-05-11 2005-12-13 Christopher Kantarjiev Technique for processing customer service transactions at customer site using mobile computing device
US8391851B2 (en) * 1999-11-03 2013-03-05 Digimarc Corporation Gestural techniques with wireless mobile phone devices
US7224995B2 (en) * 1999-11-03 2007-05-29 Digimarc Corporation Data entry method and system
US9208213B2 (en) 1999-05-28 2015-12-08 Microstrategy, Incorporated System and method for network user interface OLAP report formatting
US8607138B2 (en) 1999-05-28 2013-12-10 Microstrategy, Incorporated System and method for OLAP report generation with spreadsheet report within the network user interface
US6941270B1 (en) * 1999-06-21 2005-09-06 Nokia Corporation Apparatus, and associated method, for loading a mobile terminal with an application program installed at a peer device
US7792298B2 (en) * 1999-06-30 2010-09-07 Silverbrook Research Pty Ltd Method of using a mobile device to authenticate a printed token and output an image associated with the token
US7058817B1 (en) 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
US6611673B1 (en) * 1999-07-12 2003-08-26 Oliver T. Bayley Radio frequency-controlled telecommunication device
US7376583B1 (en) 1999-08-10 2008-05-20 Gofigure, L.L.C. Device for making a transaction via a communications link
US6964012B1 (en) 1999-09-13 2005-11-08 Microstrategy, Incorporated System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, including deployment through personalized broadcasts
US6836537B1 (en) 1999-09-13 2004-12-28 Microstrategy Incorporated System and method for real-time, personalized, dynamic, interactive voice services for information related to existing travel schedule
US8130918B1 (en) 1999-09-13 2012-03-06 Microstrategy, Incorporated System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with closed loop transaction processing
US6829334B1 (en) 1999-09-13 2004-12-07 Microstrategy, Incorporated System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with telephone-based service utilization and control
US6658093B1 (en) * 1999-09-13 2003-12-02 Microstrategy, Incorporated System and method for real-time, personalized, dynamic, interactive voice services for travel availability information
US7340040B1 (en) * 1999-09-13 2008-03-04 Microstrategy, Incorporated System and method for real-time, personalized, dynamic, interactive voice services for corporate-analysis related information
US7949722B1 (en) 1999-09-29 2011-05-24 Actv Inc. Enhanced video programming system and method utilizing user-profile information
US7052396B2 (en) * 2000-09-11 2006-05-30 Nintendo Co., Ltd. Communication system and method using pictorial characters
US7231380B1 (en) * 1999-10-09 2007-06-12 Innovaport Llc Apparatus and method for providing products location information to customers in a store
US7350071B1 (en) * 1999-11-08 2008-03-25 Avaya Technology Corp. Encrypted and non-encrypted communication of message data
US7725307B2 (en) 1999-11-12 2010-05-25 Phoenix Solutions, Inc. Query engine for processing voice based queries including semantic decoding
US7392185B2 (en) 1999-11-12 2008-06-24 Phoenix Solutions, Inc. Speech based learning/training system using semantic decoding
US6665640B1 (en) 1999-11-12 2003-12-16 Phoenix Solutions, Inc. Interactive speech based learning/training system formulating search queries based on natural language parsing of recognized user queries
US6615172B1 (en) 1999-11-12 2003-09-02 Phoenix Solutions, Inc. Intelligent query engine for processing voice based queries
US9076448B2 (en) 1999-11-12 2015-07-07 Nuance Communications, Inc. Distributed real time speech recognition system
US7050977B1 (en) 1999-11-12 2006-05-23 Phoenix Solutions, Inc. Speech-enabled server for internet website and method
US6633846B1 (en) 1999-11-12 2003-10-14 Phoenix Solutions, Inc. Distributed realtime speech recognition system
US7131006B1 (en) * 1999-11-15 2006-10-31 Verizon Laboratories Inc. Cryptographic techniques for a communications network
US7065342B1 (en) 1999-11-23 2006-06-20 Gofigure, L.L.C. System and mobile cellular telephone device for playing recorded music
CA2392869A1 (en) 1999-12-01 2001-06-07 Silverbrook Research Pty. Ltd. Sensing device for coded electronic ink surface
WO2001042906A1 (en) * 1999-12-07 2001-06-14 Actioneer, Inc. A method and apparatus for receiving information in response to a request
US8793160B2 (en) 1999-12-07 2014-07-29 Steve Sorem System and method for processing transactions
JP2003517642A (en) 1999-12-17 2003-05-27 プロモ・ヴィユー Interactive promotional information communication system
WO2001049055A3 (en) * 1999-12-28 2002-05-23 Giorgio Grego Method for detecting access to controlled areas, and related system
US6891381B2 (en) * 1999-12-30 2005-05-10 Secure Logistix Human body: scanning, typing and profiling system
US6615290B1 (en) * 2000-01-07 2003-09-02 Umax Data Systems, Inc. End-of-scan reporting system
US6760697B1 (en) * 2000-01-25 2004-07-06 Minds And Technology, Inc. Centralized processing of digital speech data originated at the network clients of a set of servers
GB0004976D0 (en) * 2000-03-01 2000-04-19 Tatis International Trade and transport information system
JP3385270B2 (en) * 2000-03-03 2003-03-10 株式会社エイティング Personal authentication method
WO2001067326A1 (en) * 2000-03-09 2001-09-13 Kitagawa, Yoshiko Information processing apparatus with optical data reader, servers, and electronic commerce method
US8531276B2 (en) 2000-03-15 2013-09-10 Logitech Europe S.A. State-based remote control system
US7187947B1 (en) 2000-03-28 2007-03-06 Affinity Labs, Llc System and method for communicating selected information to an electronic device
JP4961575B2 (en) 2000-03-31 2012-06-27 オープンティービー、インコーポレイテッド The system and method of the local meta data insertion
US7194072B2 (en) * 2000-04-19 2007-03-20 Gamble Oliver W Method and system for remotely accessing and controlling remote devices
US6526275B1 (en) * 2000-04-24 2003-02-25 Motorola, Inc. Method for informing a user of a communication device where to obtain a product and communication system employing same
JP2001306624A (en) * 2000-04-27 2001-11-02 Neorex Co Ltd Data output device and information collecting system using the same data output device
GB2362070B (en) * 2000-05-05 2004-06-16 Nokia Corp Communication devices and method of communication
FR2809262B1 (en) * 2000-05-17 2002-10-04 Sagem mobile phone with a camera and scheduling method
DE10025137A1 (en) * 2000-05-20 2001-11-22 Alcatel Sa Method and apparatus for configuration of services in a telecommunications network
US7599847B2 (en) 2000-06-09 2009-10-06 Airport America Automated internet based interactive travel planning and management system
US20020016750A1 (en) * 2000-06-20 2002-02-07 Olivier Attia System and method for scan-based input, storage and retrieval of information over an interactive communication network
US7487112B2 (en) * 2000-06-29 2009-02-03 Barnes Jr Melvin L System, method, and computer program product for providing location based services and mobile e-commerce
US7133837B1 (en) * 2000-06-29 2006-11-07 Barnes Jr Melvin L Method and apparatus for providing communication transmissions
US6754484B1 (en) * 2000-07-10 2004-06-22 Nokia Corporation Short messaging using information beacons
US7315567B2 (en) * 2000-07-10 2008-01-01 Motorola, Inc. Method and apparatus for partial interference cancellation in a communication system
US6807568B1 (en) * 2000-07-27 2004-10-19 Union Beach, L.P. Recipient selection of information to be subsequently delivered
WO2002011019A1 (en) 2000-08-01 2002-02-07 First Usa Bank, N.A. System and method for transponder-enabled account transactions
US20020019782A1 (en) * 2000-08-04 2002-02-14 Arie Hershtik Shopping method
US6650750B1 (en) * 2000-08-18 2003-11-18 Lucent Technologies Inc. Voice notification for a battery alarm in a network interface unit
US20020026419A1 (en) * 2000-08-24 2002-02-28 Sony Electronics, Inc. Apparatus and method for populating a portable smart device
WO2002017285A1 (en) * 2000-08-24 2002-02-28 Telefonaktiebolaget Lm Ericsson Advertising system using radio communication between advertiser and consumer
US20020035702A1 (en) * 2000-09-21 2002-03-21 Su-Fang Chu Method for automatically wake up a computer system to receive message transmitted via the communication protocol and to make the computer system enter into the suspend mode
US7742996B1 (en) * 2000-09-27 2010-06-22 Khai Hee Kwan Computer program, system and method for on-line issuing and verifying a representation of economic value interchangeable for money having identification data and password protection over a computer network
JP2002176671A (en) * 2000-09-28 2002-06-21 Takashi Fujimoto Mobile phone
US6728676B1 (en) * 2000-10-19 2004-04-27 International Business Machines Corporation Using speech recognition to improve efficiency of an inventory task
US7258276B2 (en) * 2000-10-20 2007-08-21 Promega Corporation Radio frequency identification method and system of distributing products
US20020183882A1 (en) 2000-10-20 2002-12-05 Michael Dearing RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US6854641B1 (en) * 2000-11-02 2005-02-15 Kabushiki Kaisha Toshiba Electronic information management system
US20020102966A1 (en) * 2000-11-06 2002-08-01 Lev Tsvi H. Object identification method for portable devices
US8224078B2 (en) 2000-11-06 2012-07-17 Nant Holdings Ip, Llc Image capture and identification system and process
US7016532B2 (en) * 2000-11-06 2006-03-21 Evryx Technologies Image capture and identification system and process
US8218873B2 (en) 2000-11-06 2012-07-10 Nant Holdings Ip, Llc Object information derived from object images
US7565008B2 (en) 2000-11-06 2009-07-21 Evryx Technologies, Inc. Data capture and identification system and process
US7680324B2 (en) 2000-11-06 2010-03-16 Evryx Technologies, Inc. Use of image-derived information as search criteria for internet and other search engines
US9310892B2 (en) 2000-11-06 2016-04-12 Nant Holdings Ip, Llc Object information derived from object images
US7240283B1 (en) 2000-11-10 2007-07-03 Narasimha Rao Paila Data transmission and rendering techniques implemented over a client-server system
US7213064B2 (en) * 2000-11-18 2007-05-01 In2M Corporation Methods and systems for job-based accounting
WO2002042943A9 (en) * 2000-11-27 2003-08-07 Airclic Inc Scalable distributed database system and method for linking codes to internet information
US7203158B2 (en) * 2000-12-06 2007-04-10 Matsushita Electric Industrial Co., Ltd. OFDM signal transmission system, portable terminal, and e-commerce system
US7188110B1 (en) 2000-12-11 2007-03-06 Sony Corporation Secure and convenient method and apparatus for storing and transmitting telephony-based data
US7406443B1 (en) * 2000-12-18 2008-07-29 Powerloom Method and system for multi-dimensional trading
US7305092B2 (en) * 2000-12-19 2007-12-04 Qualcomm Incorporated Method and system to accelerate cryptographic functions for secure e-commerce applications
FI20002804A (en) * 2000-12-20 2002-06-21 Nokia Corp Payment system
US7233914B1 (en) 2000-12-27 2007-06-19 Joyo Wijaya Technique for implementing item substitution for unavailable items relating to a customer order
US7212839B2 (en) * 2001-01-22 2007-05-01 Wildseed Limited Visualization supplemented wireless mobile telephony-audio
US6944482B2 (en) * 2001-01-22 2005-09-13 Wildseed Ltd. Visualization supplemented wireless mobile telephony
US20020099810A1 (en) * 2001-01-25 2002-07-25 Martin Kiesel Method, system & apparatus for interactive multimedia remote processor control, diagnostics and maintenance
US20020112241A1 (en) 2001-02-14 2002-08-15 Cocchi Ronald P. Internet service provider callback for satellite systems
US7308423B1 (en) * 2001-03-19 2007-12-11 Franklin Goodhue Woodward Technique for handling sales of regulated items implemented over a data network
US7092376B2 (en) 2001-03-30 2006-08-15 Hill-Rom Services, Inc. Hospital bed and network system
US20020147591A1 (en) * 2001-04-06 2002-10-10 Michael Beyo System and method for remotely producing a response in a computer using acoustic signaling
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
DE60210302D1 (en) * 2001-04-25 2006-05-18 World Medical Ct Holding S A A method for secure transfer of patient data on a data media
US7248157B2 (en) * 2001-05-01 2007-07-24 Interactive Technologies, Inc. Wireless phone-interface device
US20020172334A1 (en) * 2001-05-15 2002-11-21 Olympus Optical Co. Ltd. Printed matter, information acquiring method, information acquiring system, information resource and computer-oriented program
US6915135B1 (en) 2001-05-15 2005-07-05 Praxis Technology Group, Inc. Method and system for detecting object presence and its duration in a given area
US7313546B2 (en) 2001-05-23 2007-12-25 Jp Morgan Chase Bank, N.A. System and method for currency selectable stored value instrument
US8311887B2 (en) * 2001-05-29 2012-11-13 Fujitsu Limited Methods, devices and systems for real-time instant presence with advertisement (RIPA)
US7123933B2 (en) * 2001-05-31 2006-10-17 Orative Corporation System and method for remote application management of a wireless device
US7020457B2 (en) * 2001-05-31 2006-03-28 Orative Corporation System and method for proxy-enabling a wireless device to an existing IP-based service
JP2002358284A (en) * 2001-06-01 2002-12-13 Seiko Epson Corp Service providing system and service providing device
WO2002099598A3 (en) 2001-06-07 2004-03-25 First Usa Bank Na System and method for rapid updating of credit information
US7548875B2 (en) 2001-06-27 2009-06-16 John Mikkelsen Media delivery platform
JP2003085500A (en) * 2001-06-27 2003-03-20 Olympus Optical Co Ltd Information recording medium, information processing method, information processor and program
US7266839B2 (en) 2001-07-12 2007-09-04 J P Morgan Chase Bank System and method for providing discriminated content to network users
US7072621B1 (en) * 2001-07-17 2006-07-04 Wildseed Ltd. Luminescent signaling displays utilizing a wireless mobile communication device
WO2003010701A8 (en) 2001-07-24 2003-03-20 First Usa Bank Na Multiple account card and transaction routing
DE10137621B4 (en) * 2001-08-03 2007-11-22 Pataco Gmbh A method for providing product information
EP2302542A3 (en) 2001-08-03 2011-09-21 Hill-Rom Services, Inc. Patient point-of-care computer system
US8020754B2 (en) 2001-08-13 2011-09-20 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
WO2003017623A3 (en) * 2001-08-17 2003-05-30 Wildseed Ltd Visualization supplemented wireless mobile telephony
KR20030017721A (en) * 2001-08-22 2003-03-04 삼성전자주식회사 Display system and control method thereof
US20030046176A1 (en) * 2001-09-04 2003-03-06 Hynes Harold F. One page purchasing system
US20030061493A1 (en) * 2001-09-24 2003-03-27 Angelo Michael F. Portable voice encrypter
US20030061173A1 (en) * 2001-09-27 2003-03-27 Hiroshi Ogino Electronic gathering of product information and purchasing of products
US7082344B2 (en) * 2001-10-12 2006-07-25 Touraj Ghaffari Real time total asset visibility system
US6662068B1 (en) * 2001-10-12 2003-12-09 Touraj Ghaffari Real time total asset visibility system
US7576650B1 (en) 2001-10-12 2009-08-18 Touraj Ghaffari Real time total asset visibility system
WO2004029740A1 (en) * 2002-09-24 2004-04-08 Touraj Ghaffari Real time total asset visibility system
US7466992B1 (en) 2001-10-18 2008-12-16 Iwao Fujisaki Communication device
US7107081B1 (en) 2001-10-18 2006-09-12 Iwao Fujisaki Communication device
US7127271B1 (en) 2001-10-18 2006-10-24 Iwao Fujisaki Communication device
US7047051B2 (en) * 2001-10-25 2006-05-16 Symbol Technologies, Inc. Method of and arrangement for minimizing power consumption and data latency of an electro-optical reader in a wireless network
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US7124174B2 (en) * 2001-12-21 2006-10-17 Lockheed Martin Corporation Electronic interactive communication system and the method therefor
US7617542B2 (en) * 2001-12-21 2009-11-10 Nokia Corporation Location-based content protection
US7184797B2 (en) * 2001-12-28 2007-02-27 Nokia Corporation Data transfer rate display selection
JP4233259B2 (en) * 2002-02-08 2009-03-04 シャープ株式会社 Information providing system using code information
JP2003331054A (en) * 2002-03-05 2003-11-21 Dt Research Japan Kk Service providing system using barcode
US20030177069A1 (en) * 2002-03-12 2003-09-18 Joseph Joseph Real time inventory display and retail sales system
US7899753B1 (en) 2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication
US6918055B2 (en) * 2002-03-26 2005-07-12 Sun Microsystems, Inc. Service operations on a computer system
WO2003083619A3 (en) 2002-03-29 2004-01-08 Bank One Delaware N A System and process for performing purchase transaction using tokens
US20040204070A1 (en) * 2002-04-19 2004-10-14 August Katherine G. Wireless service provider functionality to transfer designated configuration information
US7062339B2 (en) * 2002-05-09 2006-06-13 Matsushita Electric Industrial Co., Ltd. Method and apparatus for communicating between a portable device and a server
US8611919B2 (en) 2002-05-23 2013-12-17 Wounder Gmbh., Llc System, method, and computer program product for providing location based services and mobile e-commerce
US7343005B2 (en) * 2002-05-29 2008-03-11 Time Warner Cable, A Division Of Time Warner Entertainment Company, L.P. Method and apparatus for voice-over IP services triggered by off-hook event
WO2003107289A1 (en) * 2002-06-13 2003-12-24 Itag, Inc. Unified electronic transaction fulfillment
US8370744B2 (en) * 2002-06-19 2013-02-05 Microsoft Corporation User interface for operating a computer from a distance
US8094821B2 (en) * 2004-08-06 2012-01-10 Qualcomm Incorporated Key generation in a communication system
US8630414B2 (en) * 2002-06-20 2014-01-14 Qualcomm Incorporated Inter-working function for a communication system
US20030236980A1 (en) * 2002-06-20 2003-12-25 Hsu Raymond T. Authentication in a communication system
US7290141B2 (en) * 2002-06-27 2007-10-30 Nokia, Inc. Authentication of remotely originating network messages
US6898435B2 (en) * 2002-07-16 2005-05-24 David A Milman Method of processing and billing work orders
US20040104268A1 (en) * 2002-07-30 2004-06-03 Bailey Kenneth Stephen Plug in credit card reader module for wireless cellular phone verifications
US7571206B2 (en) * 2002-08-12 2009-08-04 Equallogic, Inc. Transparent request routing for a partitioned application service
US7809595B2 (en) 2002-09-17 2010-10-05 Jpmorgan Chase Bank, Na System and method for managing risks associated with outside service providers
US7908324B2 (en) * 2002-10-02 2011-03-15 Disney Enterprises, Inc. Multi-user interactive communication network environment
US7058660B2 (en) 2002-10-02 2006-06-06 Bank One Corporation System and method for network-based project management
US7720762B1 (en) 2002-10-03 2010-05-18 Gofigure Payments, Llc System and method for electronically processing commercial transactions based upon threshold amount
WO2004034226A3 (en) * 2002-10-10 2005-02-17 Intercomp Corp Secure electronic payment messaging system with reconcilable finality
DE10250195A1 (en) * 2002-10-28 2004-05-13 OCé PRINTING SYSTEMS GMBH Method and arrangement for authenticating an operating unit and transmitting authentication information to the control unit
US7761505B2 (en) 2002-11-18 2010-07-20 Openpeak Inc. System, method and computer program product for concurrent performance of video teleconference and delivery of multimedia presentation and archiving of same
JP3654360B2 (en) * 2002-12-02 2005-06-02 ソニー株式会社 Control system and method, an information processing apparatus and method, an information processing terminal and method, recording medium and program
CA2510526C (en) * 2002-12-16 2010-11-23 Research In Motion Limited Methods and apparatus for reducing power consumption in cdma communication device
US7930716B2 (en) 2002-12-31 2011-04-19 Actv Inc. Techniques for reinsertion of local market advertising in digital video from a bypass source
US7604608B2 (en) * 2003-01-14 2009-10-20 Flowcardia, Inc. Ultrasound catheter and methods for making and using same
US7852495B2 (en) * 2003-01-15 2010-12-14 Xerox Corporation Systems and methods for generating document distribution confirmation sheets with multi-destination status and/or multi-service status information
US7627650B2 (en) * 2003-01-20 2009-12-01 Equallogic, Inc. Short-cut response for distributed services
US7461146B2 (en) * 2003-01-20 2008-12-02 Equallogic, Inc. Adaptive storage block data distribution
US7127577B2 (en) * 2003-01-21 2006-10-24 Equallogic Inc. Distributed snapshot process
US7937551B2 (en) * 2003-01-21 2011-05-03 Dell Products L.P. Storage systems having differentiated storage pools
US8499086B2 (en) 2003-01-21 2013-07-30 Dell Products L.P. Client load distribution
US8037264B2 (en) 2003-01-21 2011-10-11 Dell Products, L.P. Distributed snapshot process
US20040210724A1 (en) * 2003-01-21 2004-10-21 Equallogic Inc. Block data migration
US8229512B1 (en) 2003-02-08 2012-07-24 Iwao Fujisaki Communication device
US7487460B2 (en) * 2003-03-21 2009-02-03 Microsoft Corporation Interface for presenting data representations in a screen-area inset
US8241128B1 (en) 2003-04-03 2012-08-14 Iwao Fujisaki Communication device
US20040208180A1 (en) * 2003-04-15 2004-10-21 Light Allen Miles System and method for supporting auto-negotiation among standards having different rates
JP3615749B2 (en) * 2003-04-25 2005-02-02 三菱電機インフォメーションシステムズ株式会社 Print service system and print services program
US6804781B1 (en) * 2003-05-12 2004-10-12 Hewlett-Packard Development Company, L.P. System and method for security of information in a memory
US20060123428A1 (en) * 2003-05-15 2006-06-08 Nantasket Software, Inc. Network management system permitting remote management of systems by users with limited skills
US8306907B2 (en) 2003-05-30 2012-11-06 Jpmorgan Chase Bank N.A. System and method for offering risk-based interest rates in a credit instrument
US7043754B2 (en) * 2003-06-12 2006-05-09 Michael Arnouse Method of secure personal identification, information processing, and precise point of contact location and timing
US7472275B2 (en) * 2003-06-13 2008-12-30 Michael Arnouse System and method of electronic signature verification
US7013365B2 (en) 2003-06-16 2006-03-14 Michael Arnouse System of secure personal identification, information processing, and precise point of contact location and timing
CN100530226C (en) 2003-07-22 2009-08-19 诺基亚公司 Reader device for radio frequency identification transponder with transponder functionality
US7118032B2 (en) * 2003-08-15 2006-10-10 Lockheed Martin Corporation Portable transaction terminal having an image recognition system
US7590837B2 (en) * 2003-08-23 2009-09-15 Softex Incorporated Electronic device security and tracking system and method
US8090402B1 (en) 2003-09-26 2012-01-03 Iwao Fujisaki Communication device
US20080162300A1 (en) * 2003-09-26 2008-07-03 Ewald Stephen A System and Method for Purchasing Linked with Broadcast Media
US8121635B1 (en) 2003-11-22 2012-02-21 Iwao Fujisaki Communication device
US20050130717A1 (en) * 2003-11-25 2005-06-16 Gosieski George J.Jr. System and method for managing audio and visual data in a wireless communication system
US7231233B2 (en) * 2003-11-25 2007-06-12 G Squared, Llc Combined multi-media and in ear monitoring system and method of remote monitoring and control thereof
US7387250B2 (en) 2003-12-04 2008-06-17 Scanbuy, Inc. System and method for on the spot purchasing by scanning barcodes from screens with a mobile device
JP4283102B2 (en) * 2003-12-24 2009-06-24 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Non-contact reading type recording medium, a portable terminal, method of controlling a mobile terminal, 該制 computer-executable program for executing a control method in a mobile terminal and an information processing system,
US7280807B2 (en) * 2004-01-14 2007-10-09 Samuel Eak Hua Nguy Initiator device capable of two-way half-duplex communication with multiple recipient devices
US8725626B2 (en) * 2004-01-23 2014-05-13 Nokia Corporation Method, device and system for automated context information based selective data provision by identification means
EP1714414A2 (en) * 2004-02-09 2006-10-25 Michael Arnouse Log-in security device
US20050264303A1 (en) * 2004-02-12 2005-12-01 Bailey Kenneth S Radiation monitoring of body part sizing and use of such sizing for person monitoring
US7406696B2 (en) * 2004-02-24 2008-07-29 Dialogic Corporation System and method for providing user input information to multiple independent, concurrent applications
US20050186913A1 (en) * 2004-02-24 2005-08-25 Research In Motion Limited Remote user interface
US7885272B2 (en) * 2004-02-24 2011-02-08 Dialogic Corporation Remote control of device by telephone or other communication devices
JP4517674B2 (en) * 2004-02-25 2010-08-04 パナソニック株式会社 Wireless communication medium processing apparatus
CN100440107C (en) * 2004-02-29 2008-12-03 深圳市朗科科技股份有限公司 Wireless based system for controlling household digital devices
US20050206513A1 (en) * 2004-03-17 2005-09-22 Fallon Kenneth T Voice remote command and control of a mapping security system
US8225014B2 (en) 2004-03-17 2012-07-17 Nokia Corporation Continuous data provision by radio frequency identification (RFID) transponders
US9084116B2 (en) 2004-03-19 2015-07-14 Nokia Technologies Oy Detector logic and radio identification device and method for enhancing terminal operations
US8041348B1 (en) 2004-03-23 2011-10-18 Iwao Fujisaki Communication device
US7341456B2 (en) * 2004-03-25 2008-03-11 Mcadams John B Braille type device, system, and method
US7296747B2 (en) 2004-04-20 2007-11-20 Michael Rohs Visual code system for camera-equipped mobile devices and applications thereof
US7616797B2 (en) * 2004-08-23 2009-11-10 Bailey Kenneth S Minutia detection from measurement of a human skull and identifying and profiling individuals from the human skull detection
US7216803B2 (en) * 2005-01-21 2007-05-15 Kingsley Chukwudum Nwosu Biometric delegation and authentication of financial transactions
US9043241B1 (en) * 2005-03-16 2015-05-26 Hewlett-Packard Development Company, L.P. Encrypting a text unit from package information for package authentication
US8208954B1 (en) 2005-04-08 2012-06-26 Iwao Fujisaki Communication device
DE102006018238A1 (en) 2005-04-20 2007-03-29 Logitech Europe S.A. Remote control system for home theater system, analyzes log of events stored by remote controller to identify patterns of interest in logged use of remote controller
US7775428B2 (en) * 2005-05-06 2010-08-17 Berkun Kenneth A Systems and methods for generating, reading and transferring identifiers
US7427018B2 (en) * 2005-05-06 2008-09-23 Berkun Kenneth A Systems and methods for generating, reading and transferring identifiers
US7284921B2 (en) 2005-05-09 2007-10-23 Silverbrook Research Pty Ltd Mobile device with first and second optical pathways
US20060258397A1 (en) * 2005-05-10 2006-11-16 Kaplan Mark M Integrated mobile application server and communication gateway
US7401731B1 (en) 2005-05-27 2008-07-22 Jpmorgan Chase Bank, Na Method and system for implementing a card product with multiple customized relationships
US7970386B2 (en) * 2005-06-03 2011-06-28 Good Technology, Inc. System and method for monitoring and maintaining a wireless device
US9911124B2 (en) 2005-07-22 2018-03-06 Gtj Ventures, Llc Transaction security apparatus and method
US9235841B2 (en) 2005-07-22 2016-01-12 Gtj Ventures, Llc Transaction security apparatus and method
US9245270B2 (en) 2005-07-22 2016-01-26 Gtj Ventures, Llc Transaction security apparatus and method
CA2617938A1 (en) * 2005-08-03 2007-02-15 Intercomputer Corporation System and method for user identification and authentication
US7742758B2 (en) * 2005-08-19 2010-06-22 Callpod, Inc. Mobile conferencing and audio sharing technology
US20070049252A1 (en) * 2005-08-31 2007-03-01 Motorola, Inc. Failure handling during security exchanges between a station and an access point in a WLAN
US7855805B2 (en) 2005-09-19 2010-12-21 Silverbrook Research Pty Ltd Printing a competition entry form using a mobile device
US7756526B2 (en) 2005-09-19 2010-07-13 Silverbrook Research Pty Ltd Retrieving a web page via a coded surface
US20070064259A1 (en) * 2005-09-19 2007-03-22 Silverbrook Research Pty Ltd Printing a timetable using a mobile device
US7621442B2 (en) 2005-09-19 2009-11-24 Silverbrook Research Pty Ltd Printing a subscription using a mobile device
CA2544651A1 (en) * 2005-09-22 2007-03-22 Sunrise Tradex Corp. Interactive communication system for remotely providing product information
US7529317B2 (en) * 2005-09-26 2009-05-05 Broadcom Corporation Supply independent Schmitt trigger RC oscillator
JP2007104410A (en) * 2005-10-05 2007-04-19 Kenwood Corp Position transmitting device, wireless communication apparatus, position management system, and position transmitting method
US8023746B2 (en) * 2005-10-14 2011-09-20 Disney Enterprises, Inc. Systems and methods for decoding an image to determine a digital identifier
US7480422B2 (en) * 2005-10-14 2009-01-20 Disney Enterprises, Inc. Systems and methods for information content delivery relating to an object
US7801359B2 (en) * 2005-10-14 2010-09-21 Disney Enterprise, Inc. Systems and methods for obtaining information associated with an image
FR2893441B1 (en) * 2005-11-15 2008-12-26 Smartware Sarl Control system multi-format portable identification items
KR100658151B1 (en) * 2006-02-13 2006-12-08 삼성전자주식회사 Method and apparatus for position setting of mp3 player's in mobile phone
EP1821247A1 (en) * 2006-02-16 2007-08-22 7 Layers AG Method for analysis, control, automation and information management of life-cycle-processes of technical products
US8016187B2 (en) 2006-02-21 2011-09-13 Scanbury, Inc. Mobile payment system using barcode capture
US20070265734A1 (en) * 2006-04-07 2007-11-15 Clark Christopher M Traffic information system
US20070235525A1 (en) * 2006-04-07 2007-10-11 Nearnet Llc Information accessing and conveying systems and methods
US8150163B2 (en) 2006-04-12 2012-04-03 Scanbuy, Inc. System and method for recovering image detail from multiple image frames in real-time
US7707250B2 (en) * 2006-05-02 2010-04-27 Callpod, Inc. Wireless communications connection device
US7822606B2 (en) * 2006-07-14 2010-10-26 Qualcomm Incorporated Method and apparatus for generating audio information from received synthesis information
FR2905544B1 (en) * 2006-08-30 2008-12-19 Cogelec Soc Par Actions Simpli Method of controlling access of a building, platinum intercom and access server for this method.
US8540516B2 (en) 2006-11-27 2013-09-24 Pharos Innovations, Llc Optimizing behavioral change based on a patient statistical profile
US8540515B2 (en) 2006-11-27 2013-09-24 Pharos Innovations, Llc Optimizing behavioral change based on a population statistical profile
US8540517B2 (en) 2006-11-27 2013-09-24 Pharos Innovations, Llc Calculating a behavioral path based on a statistical profile
GB2446211B (en) * 2007-01-31 2012-03-07 Hewlett Packard Development Co Method and apparatus for enabling interaction between a mobile device and another device
WO2008104995A3 (en) * 2007-02-28 2009-12-30 Raja Raman A method and system for close range communication using audio tones
US7710275B2 (en) 2007-03-16 2010-05-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
US8662396B2 (en) * 2007-03-23 2014-03-04 Labels That Talk, Ltd Method for reproducing and using a bar code symbol
US20080245869A1 (en) * 2007-03-23 2008-10-09 Ltt, Ltd Method and apparatus for reading a printed indicia with a limited field of view sensor
WO2008118425A1 (en) 2007-03-23 2008-10-02 Ltt, Ltd Method and apparatus for using a limited capacity portable data carrier
US20080262995A1 (en) * 2007-04-19 2008-10-23 Microsoft Corporation Multimodal rating system
US8559983B1 (en) 2007-05-03 2013-10-15 Iwao Fujisaki Communication device
US7890089B1 (en) 2007-05-03 2011-02-15 Iwao Fujisaki Communication device
US20080299970A1 (en) 2007-05-30 2008-12-04 Shoptext, Inc. Consumer Registration Via Mobile Device
GB0714471D0 (en) * 2007-07-25 2007-09-05 Vetco Gray Controls Ltd Electronics module
US8676273B1 (en) 2007-08-24 2014-03-18 Iwao Fujisaki Communication device
CN101388648B (en) 2007-09-14 2011-08-10 财团法人工业技术研究院 Multi-frequency multi-mode power amplifier and operating method thereof
US20090102671A1 (en) * 2007-10-17 2009-04-23 Kevin Donald Susewitt Low battery alert for an image reader
US8639214B1 (en) 2007-10-26 2014-01-28 Iwao Fujisaki Communication device
US8472935B1 (en) 2007-10-29 2013-06-25 Iwao Fujisaki Communication device
US8744720B1 (en) 2007-12-27 2014-06-03 Iwao Fujisaki Inter-vehicle middle point maintaining implementer
US9262594B2 (en) 2008-01-18 2016-02-16 Microsoft Technology Licensing, Llc Tamper evidence per device protected identity
US8554652B1 (en) 2008-02-21 2013-10-08 Jpmorgan Chase Bank, N.A. System and method for providing borrowing schemes
US7853492B1 (en) 2008-03-17 2010-12-14 Kirklin Frederic J System for merchandise ordering and order fulfillment
US8543157B1 (en) 2008-05-09 2013-09-24 Iwao Fujisaki Communication device which notifies its pin-point location or geographic area in accordance with user selection
US8340726B1 (en) 2008-06-30 2012-12-25 Iwao Fujisaki Communication device
US8452307B1 (en) 2008-07-02 2013-05-28 Iwao Fujisaki Communication device
US8429009B2 (en) * 2008-07-16 2013-04-23 Paycode Inc. Universal affinity system
US8689308B2 (en) * 2008-09-30 2014-04-01 At&T Intellectual Property I, L. P. Portable authentication device
US20100114734A1 (en) * 2008-11-05 2010-05-06 Ford Global Technologies, Llc Telematics computer system and method for mobile wireless retail order processing and fulfillment
US8887052B1 (en) 2009-01-09 2014-11-11 Google Inc. Presentation remote control
JP5434154B2 (en) * 2009-03-09 2014-03-05 富士通株式会社 Information notifying method, the information notifying system, an information processing apparatus and information notifying program
US9230259B1 (en) 2009-03-20 2016-01-05 Jpmorgan Chase Bank, N.A. Systems and methods for mobile ordering and payment
US9235831B2 (en) 2009-04-22 2016-01-12 Gofigure Payments, Llc Mobile payment systems and methods
US8825548B2 (en) * 2009-06-30 2014-09-02 Ebay Inc. Secure authentication between multiple parties
US9811788B2 (en) * 2009-07-01 2017-11-07 Cm Systems, Llc Food safety management system
US8457596B2 (en) 2009-07-02 2013-06-04 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
EP2280580A1 (en) * 2009-07-07 2011-02-02 Nokia Corporation Data transfer with wirelessly powered communication devices
US7873349B1 (en) 2009-10-06 2011-01-18 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
US8473818B2 (en) * 2009-10-12 2013-06-25 Empire Technology Development Llc Reliable communications in on-chip networks
US9020827B2 (en) * 2009-10-16 2015-04-28 Baxter International Inc. Peritoneal dialysis optimized using a patient hand-held scanning device
JP5403678B2 (en) * 2009-10-21 2014-01-29 Necカシオモバイルコミュニケーションズ株式会社 Wireless communication terminal, a radio communication system and a computer program
US8553859B1 (en) 2010-02-03 2013-10-08 Tal Lavian Device and method for providing enhanced telephony
US8548131B1 (en) 2010-02-03 2013-10-01 Tal Lavian Systems and methods for communicating with an interactive voice response system
US8879698B1 (en) 2010-02-03 2014-11-04 Tal Lavian Device and method for providing enhanced telephony
US8572303B2 (en) 2010-02-03 2013-10-29 Tal Lavian Portable universal communication device
US8681951B1 (en) 2010-02-03 2014-03-25 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8548135B1 (en) 2010-02-03 2013-10-01 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8537989B1 (en) 2010-02-03 2013-09-17 Tal Lavian Device and method for providing enhanced telephony
US8594280B1 (en) 2010-02-03 2013-11-26 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US8687777B1 (en) 2010-02-03 2014-04-01 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8625756B1 (en) 2010-02-03 2014-01-07 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US9001819B1 (en) 2010-02-18 2015-04-07 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
EP2374439A3 (en) 2010-04-09 2015-11-25 Hill-Rom Services, Inc. Patient support, communication, and computing apparatus
US8661515B2 (en) * 2010-05-10 2014-02-25 Intel Corporation Audible authentication for wireless network enrollment
US8508401B1 (en) 2010-08-31 2013-08-13 Logitech Europe S.A. Delay fixing for command codes in a remote control system
US8249242B2 (en) 2010-09-09 2012-08-21 Symbol Technologies, Inc. Secure call DTMF signaling
US8406388B2 (en) 2011-07-18 2013-03-26 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US8903073B2 (en) 2011-07-20 2014-12-02 Zvi Or-Bach Systems and methods for visual presentation and selection of IVR menu
US9489250B2 (en) * 2011-09-05 2016-11-08 Infosys Limited System and method for managing a network infrastructure using a mobile device
US8867708B1 (en) 2012-03-02 2014-10-21 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US8731148B1 (en) 2012-03-02 2014-05-20 Tal Lavian Systems and methods for visual presentation and selection of IVR menu
US20130318584A1 (en) * 2012-05-25 2013-11-28 Qualcomm Incorporated Learning information on usage by a user, of one or more device(s), for cumulative inference of user's situation
US8547247B1 (en) * 2012-07-06 2013-10-01 Alan Haddy Detecting, locating and tracing of buried assets using distributed processing over communications networks
US9539155B2 (en) 2012-10-26 2017-01-10 Hill-Rom Services, Inc. Control system for patient support apparatus
US20140231499A1 (en) * 2013-02-18 2014-08-21 Lawrence David Simmons, JR. Geographic locator for economic activity
US9565637B2 (en) 2013-03-14 2017-02-07 T-Mobile Usa, Inc. High power channel state notification for mobile applications
US20170046707A1 (en) * 2015-08-13 2017-02-16 NewStore System and Method for Mobile Device Self-Checkout for Retail Transactions with Loss Protection

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4736094A (en) * 1984-04-03 1988-04-05 Omron Tateisi Electronics Co. Financial transaction processing system using an integrated circuit card device
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
US4983816A (en) * 1988-02-24 1991-01-08 Kabushiki Kaisha Toshiba Portable electronic device
US4998279A (en) * 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US5006698A (en) * 1987-07-07 1991-04-09 Schlumberger Industries Antifraud method and device for a selective access system
US5157717A (en) * 1989-11-03 1992-10-20 National Transaction Network, Inc. Portable automated teller machine
US5361062A (en) * 1992-11-25 1994-11-01 Security Dynamics Technologies, Inc. Personal security system
US5363449A (en) * 1993-03-11 1994-11-08 Tandem Computers Incorporated Personal identification encryptor and method
WO1995008821A1 (en) * 1993-09-21 1995-03-30 VCS INDUSTRIES, INC., doing business as VOICE CONTROL SYSTEMS Voice-controlled account access over a telephone network

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3962553A (en) * 1973-03-29 1976-06-08 Motorola, Inc. Portable telephone system having a battery saver feature
US4460960A (en) * 1979-02-02 1984-07-17 International Business Machines Corporation Transaction execution system having keyboard and message customization, improved key function versatility and message segmentation
US4569421A (en) * 1980-11-17 1986-02-11 Sandstedt Gary O Restaurant or retail vending facility
US4471218B1 (en) * 1982-05-19 1989-08-01
US4516016A (en) * 1982-09-24 1985-05-07 Kodron Rudolf S Apparatus for recording and processing guest orders in restaurants or the like
US4682015A (en) * 1985-03-07 1987-07-21 Hewlett-Packard Company Low powered high ambient light bar code reader circuit
US4857716A (en) * 1986-05-12 1989-08-15 Clinicom Incorporated Patient identification and verification system and method
US5227614A (en) * 1986-08-15 1993-07-13 Norand Corporation Core computer processor module, and peripheral shell module assembled to form a pocket size data capture unit
JP2624674B2 (en) * 1987-04-10 1997-06-25 株式会社日立製作所 Transaction Processing Systems
US4797920A (en) * 1987-05-01 1989-01-10 Mastercard International, Inc. Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
US4860341A (en) 1987-06-02 1989-08-22 Motorola, Inc. Radiotelephone credit card call approval synchronization
US4947028B1 (en) * 1988-07-19 1993-06-08 U S Order Inc
JPH0290335A (en) * 1988-09-28 1990-03-29 Hitachi Ltd Remote operation control system for computer system
US4961220A (en) * 1988-12-21 1990-10-02 Spectrum Concepts, Inc. Power management in a microprocessor-controlled battery-powered telephone device
US4957348A (en) * 1989-03-21 1990-09-18 Hewlett-Packard Company Optical transceiver with multiple communication modes
US5109222A (en) * 1989-03-27 1992-04-28 John Welty Remote control system for control of electrically operable equipment in people occupiable structures
US4978305A (en) * 1989-06-06 1990-12-18 Educational Testing Service Free response test grading method
US5029183A (en) * 1989-06-29 1991-07-02 Symbol Technologies, Inc. Packet data communication network
US5142550A (en) * 1989-06-29 1992-08-25 Symbol Technologies, Inc. Packet data communication system
US5103461A (en) * 1989-06-29 1992-04-07 Symbol Technologies, Inc. Signal quality measure in packet data communication
US5157687A (en) * 1989-06-29 1992-10-20 Symbol Technologies, Inc. Packet data communication network
US5280498A (en) * 1989-06-29 1994-01-18 Symbol Technologies, Inc. Packet data communication system
US5278995A (en) * 1990-08-09 1994-01-11 Samsung Electronics Co. Ltd. Radio calling method of a portable radio phone providing power conservation functions
WO1992003049A1 (en) * 1990-08-23 1992-03-05 New York University Methods and compositions for treating t-cell mediated diseases
US5365577A (en) * 1990-09-27 1994-11-15 Radish Communications Systems, Inc. Telecommunication display system
US5340966A (en) * 1990-10-23 1994-08-23 Matsushita Electric Industrial Co., Ltd. Automatic facsimile-receiving-sheet recognizing apparatus
US5221838A (en) * 1990-12-24 1993-06-22 Motorola, Inc. Electronic wallet
US5204768A (en) * 1991-02-12 1993-04-20 Mind Path Technologies, Inc. Remote controlled electronic presentation system
CA2084768A1 (en) * 1991-04-16 1992-10-17 John Barrus Method of and apparatus for the ordering from remote locations, such as a home or office or the like, of merchandise and/or services from a central location such as a store or warehouse and the like
US5241542A (en) * 1991-08-23 1993-08-31 International Business Machines Corporation Battery efficient operation of scheduled access protocol
US5249230A (en) 1991-11-21 1993-09-28 Motorola, Inc. Authentication system
US5317636A (en) * 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5324922A (en) * 1993-02-25 1994-06-28 Verifone, Inc. Apparatus and method for managing transactions
US5365050A (en) * 1993-03-16 1994-11-15 Worthington Data Solutions Portable data collection terminal with voice prompt and recording
US5343519A (en) 1993-09-07 1994-08-30 Peter Feldman Autodialer with pin feature
DE69407950D1 (en) * 1993-10-11 1998-02-19 4 P Srl Electronic multipurpose hand calculator
US5483052A (en) * 1993-12-07 1996-01-09 Smith, Iii; Herbert J. System for reading, storing and using bar-encoded data from a coded business card or other printed material

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
US4736094A (en) * 1984-04-03 1988-04-05 Omron Tateisi Electronics Co. Financial transaction processing system using an integrated circuit card device
US4998279A (en) * 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US5006698A (en) * 1987-07-07 1991-04-09 Schlumberger Industries Antifraud method and device for a selective access system
US4983816A (en) * 1988-02-24 1991-01-08 Kabushiki Kaisha Toshiba Portable electronic device
US5157717A (en) * 1989-11-03 1992-10-20 National Transaction Network, Inc. Portable automated teller machine
US5361062A (en) * 1992-11-25 1994-11-01 Security Dynamics Technologies, Inc. Personal security system
US5363449A (en) * 1993-03-11 1994-11-08 Tandem Computers Incorporated Personal identification encryptor and method
WO1995008821A1 (en) * 1993-09-21 1995-03-30 VCS INDUSTRIES, INC., doing business as VOICE CONTROL SYSTEMS Voice-controlled account access over a telephone network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO9641446A1 *

Also Published As

Publication number Publication date Type
WO1996041447A1 (en) 1996-12-19 application
EP0958672A4 (en) 2002-05-22 application
WO1996041448A1 (en) 1996-12-19 application
US6144848A (en) 2000-11-07 grant
JPH11507775A (en) 1999-07-06 application
WO1996041446A1 (en) 1996-12-19 application
EP1023794A1 (en) 2000-08-02 application
EP0958672A1 (en) 1999-11-24 application
EP0836773A1 (en) 1998-04-22 application
JPH11507451A (en) 1999-06-29 application
JPH11507777A (en) 1999-07-06 application

Similar Documents

Publication Publication Date Title
US7020773B1 (en) Strong mutual authentication of devices
US7000115B2 (en) Method and apparatus for uniquely and authoritatively identifying tangible objects
US4771461A (en) Initialization of cryptographic variables in an EFT/POS network with a large number of terminals
US5636280A (en) Dual key reflexive encryption security system
US5778065A (en) Method and system for changing an authorization password or key in a distributed communication network
US5878143A (en) Secure transmission of sensitive information over a public/insecure communications medium
US7236598B2 (en) Systems and methods for communication protection
US6161182A (en) Method and apparatus for restricting outbound access to remote equipment
US6141423A (en) Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets
US4723284A (en) Authentication system
US7131001B1 (en) Apparatus and method for secure filed upgradability with hard wired public key
US7139550B2 (en) Method and system for verifying the authenticity of a first communication participants in a communications network
US20030028493A1 (en) Personal information management system, personal information management method, and information processing server
US7039802B1 (en) Conditional access system for set-top boxes
US6782080B2 (en) Arrangement for authenticating user and authorizing use of secured system
US6157722A (en) Encryption key management system and method
US5602918A (en) Application level security system and method
US20020035543A1 (en) System and method for detecting high credit risk customers
US20020002503A1 (en) Business method by internet connection information registration service, internet connection setting method, internet connection information registration method, and computer-readable recording medium which records application program
US6704715B1 (en) Method and system for ensuring the security of the remote supply of services of financial institutions
US5745576A (en) Method and apparatus for initialization of cryptographic terminal
US20040215980A1 (en) Flexible method of user authentication
US20030041244A1 (en) Method for securing communications between a terminal and an additional user equipment
US5878142A (en) Pocket encrypting and authenticating communications device
US20020174345A1 (en) Remote authenticating biometric apparatus and method for networks and the like

Legal Events

Date Code Title Description
17P Request for examination filed

Effective date: 19980107

AK Designated contracting states:

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

A4 Despatch of supplementary search report

Effective date: 20011123

AK Designated contracting states:

Kind code of ref document: A4

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

RIC1 Classification (correction)

Free format text: 7H 04L 9/00 A, 7G 07F 7/10 B, 7G 07F 19/00 B

17Q First examination report

Effective date: 20020515

18W Withdrawn

Withdrawal date: 20021122